A Study: Cryptology Techniques and Methodologies
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 12
Abstract
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and
Integration Satellite Multi Resolution Image Data Using Wavelet Transform to Identify Soil Moisture Dynamics at Lampung Tengah, Indonesia
Integration Satellite Multi Resolution Image Data Using Wavelet Transform to Identify Soil Moisture Dynamics at Lampung Tengah, Indonesia
Autism and Seisures in Children Admitted in a Tertiary Hospital
Autism is associated with epilepsy in early childhood, with evidence suggesting that individuals with both autism and more severecognitive impairment are at higher risk. The frequency of an abnormal electroencephalogram...
Factors Related to the Stigma Associated with HIV / Aids Patient
Abstract: HIV/AIDS related stigma (H/A stigma) is invoked as a persistent and pernicious problem . The manifestation of H/A stigma not only varies by cultural/national setting, but also by whether one is considering intr...
Prevalence of Social Networks Addiction among Ethiopian Youths
A curiosity and mystique around teens and youths behavior has long been a cultural obsession. The world of social networks has captured the youths’ attention because of their ability to embrace new things quickly as they...
Design and Implementation of DDR SDRAM Controller using Verilog
Double Data Rate Synchronous DRAM (DDR SDRAM) has become a mainstream memory of choice in design due to its speed, burst access and pipeline features. The DDR SDRAM is an enhancement to the conventional SDRAM running at...